Learning Internet of Things

More Information
Learn
  • Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
  • Use important communication patterns, such as the request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
  • Secure the life cycle of Things on the Internet by using Thing registries and delegation of trust
  • Decrease complexity and development time by using Internet of Things service platforms
  • Understand basic threats on the Internet and implement effective counter measures
  • Combine interoperability and security to create open yet secure solutions
  • Implement secure, scalable, decentralized, and interoperable architectures and solutions for Internet of Things
About

This book starts by exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. You will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. Thing registries and delegation of trust are introduced as important tools to secure the life cycle of Things on the Internet. Once the fundamentals have been mastered, your focus will move to the Internet of Things architecture. A secure architecture is proposed that will take full advantage of the power of Internet of Things and at the same time protect end user integrity and private personal data without losing flexibility and interoperability.

This book provides you with a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things.

Features
  • Design and implement state-of-the-art solutions for Internet of Things using different communication protocols, patterns, C# and Raspberry Pi
  • Learn the capabilities and differences between popular protocols and communication patterns and how they can be used, and should not be used, to create secure and interoperable services and things
  • A step-by-step hands-on tutorial with complete source code, that provides interoperable solutions for sensors, actuators, controllers, cameras, and protocol brides
Page Count 242
Course Length 7 hours 15 minutes
ISBN 9781783553532
Date Of Publication 27 Jan 2015

Authors

Peter Waher

Peter Waher is the founder of Little Sister®, a standards-based distributed social network, based on the principles of edge computing, privacy & information ownership, for humans and machines. Currently, Peter advises companies on topics such as privacy, the IoT and Smart Cities. He has worked for 24 years with computers and device communication, including low-level development in assembler for resource-constrained devices to high-level system design and architecture. His award-winning applications has attracted global attention, and he has been invited to speak at prestigious events.